Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Critical Microsoft 365 Copilot Flaws Ex Vulnerabilities Expose
May 9, 2026
Home/CyberSecurity News/Apache Traffic Server Vulnerabilities Let Attackers Trigger DoS Attack
CyberSecurity News

Apache Traffic Server Vulnerabilities Let Attackers Trigger DoS Attack

The Apache Software Foundation has issued emergency security updates for its Apache Traffic Server (ATS), patching two severe vulnerabilities. ATS operates as a high-performance web proxy cache that...

David kimber
David kimber
April 6, 2026 2 Min Read
5 0

The Apache Software Foundation has issued emergency security updates for its Apache Traffic Server (ATS), patching two severe vulnerabilities.

ATS operates as a high-performance web proxy cache that improves network efficiency and handles massive volumes of enterprise web traffic.

These newly discovered flaws stem from how the server processes HTTP requests with message bodies.

If left unpatched, remote attackers can exploit these weaknesses to trigger Denial-of-Service (DoS) conditions or execute complex HTTP request smuggling attacks against enterprise networks.

Apache Traffic Server Vulnerabilities

The most disruptive flaw is tracked as CVE-2025-58136. Security researcher Masakazu Kitajo discovered that a simple, legitimate HTTP POST request can cause the entire ATS application to crash.

Because POST requests are standard methods for submitting data to a web server, this vulnerability is highly accessible to remote attackers.

When exploited, the crash results in an immediate Denial-of-Service attack, bringing down the proxy server and blocking access for all legitimate users relying on that infrastructure.

The second vulnerability, designated as CVE-2025-65114, was identified by security researcher Katsutoshi Ikenoya.

This flaw centers on how the Apache Traffic Server handles malformed chunked message bodies during data transmission. Attackers can exploit this improper handling to achieve HTTP request smuggling.

This advanced attack technique enables malicious actors to manipulate the processing of sequences of HTTP requests, bypassing security controls to poison web caches or gain unauthorized access to sensitive data on downstream servers.

These vulnerabilities impact multiple active branches of the Apache Traffic Server. According to the official security advisory, the affected software includes ATS versions 9.0.0 through 9.2.12, as well as versions 10.0.0 through 10.1.1.

Administrators managing these specific versions must take immediate action to secure their network environments against potential exploitation.

The Apache Software Foundation strongly recommends that all administrators upgrade their installations to the latest secure releases.

Users operating on the 9.x branch should update to version 9.1.13 or later. Meanwhile, organizations utilizing the 10.x branch must upgrade to version 10.1.2 or newer to completely eliminate the threat.

For teams that cannot immediately apply the software updates, a temporary workaround exists for the DoS vulnerability (CVE-2025-58136).

Administrators can stop the crash by setting the proxy.config.http.request_buffer_enabled parameter to 0. Fortunately, this is already the default value in the system configuration, meaning many servers may already be protected from the crash.

However, there is absolutely no workaround available for the request smuggling vulnerability (CVE-2025-65114). Consequently, a full software upgrade remains the only effective strategy to secure the server environment against both threats.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Google Bug Bounty Program Hits Record $17M in Google’s All-Time

Next Post

Critical Dgraph Vulnerability: Attackers Bypass Authentication

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Hackers Steal Crypto & Passwords via Fake OpenClaw Installer
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us